Showing 1,541 - 1,560 results of 2,197 for search '"information systems"', query time: 0.10s Refine Results
  1. 1541

    Advanced groundwater potential and contamination vulnerability assessment using integrated GIS-based AHP techniques: A case study from the Bizerte watershed, Tunisia by Cyrine Belhadj, Rihab Riahi, Abdelaziz Sebei, Sinda Sifi, Noamen Rebai

    Published 2025-06-01
    “…Weights were assigned via an AHP-based pairwise comparison matrix and integrated using Geographic Information System (GIS) technology to generate a groundwater potential map. …”
    Get full text
    Article
  2. 1542

    Unified operation monitoring and security warning platform based on big data in energy group by Jing WANG, Kunlun GAO, Chaoyi BIAN, Xiao LIANG

    Published 2018-05-01
    “…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
    Get full text
    Article
  3. 1543

    A Spatial Analysis of Cultural Ecosystem Service Valuation by Regional Stakeholders in Florida—A Coastal Application of the Social Values for Ecosystem Services (SolVES) Tool by Alisa W. Coffin, Robert A. Swett, Zachary D. Cole

    Published 2013-02-01
    “…This 4-page fact sheet describes a project to use a geographic information system application, SolVES 2.0, to assess, map and quantify environmental benefits to people to assist in coastal development decision making. …”
    Get full text
    Article
  4. 1544

    Review of cloud based trust model by GU Xin, XU Zheng-quan, LIU Jin

    Published 2011-01-01
    “…Combining the concepts of trust and cloud,the trust evaluation model of security application was discussed from the perspective of subjective.The fuzziness and randomness subjective description to network objects and the reli-ability of the information evaluation could be provided by cloud based trust model(CTM),and it also,improving the se-curity of network applications,determined the trust level of entire information system.By reviewing the implement prin-ciple,classic improvement and existing problems,the mechanism of CTM could be analyzed,and the development direc-tions for CTM were pointed out.…”
    Get full text
    Article
  5. 1545

    A Spatial Analysis of Cultural Ecosystem Service Valuation by Regional Stakeholders in Florida—A Coastal Application of the Social Values for Ecosystem Services (SolVES) Tool by Alisa W. Coffin, Robert A. Swett, Zachary D. Cole

    Published 2013-02-01
    “…This 4-page fact sheet describes a project to use a geographic information system application, SolVES 2.0, to assess, map and quantify environmental benefits to people to assist in coastal development decision making. …”
    Get full text
    Article
  6. 1546

    Information Assurance Framework of Military Cloud by Baoping Guo, Jian1 Cheng, Weiping2 Liu

    Published 2015-12-01
    “…Due to the powerful capacity of information processing, on-demand and elastic service model, and enhanced security, cloud computing has become the future of military information system. At first, the conception and feature of cloud computing security was discussed. …”
    Get full text
    Article
  7. 1547
  8. 1548

    Health Care System in Sudan: Review and Analysis of Strength, Weakness, Opportunity, and Threats (SWOT Analysis) by Ebrahim Mohammed Abdullah Ebrahim, Luam Ghebrehiwot, Tasneem Abdalgfar, Muhammad Hanafiah Juni

    Published 2017-09-01
    “…Despite this there is poor implementation and organization along with frail health information system. The main external factors that drawback the system is the overall economic instability which resulted in cutting of the health expenditure. …”
    Get full text
    Article
  9. 1549
  10. 1550
  11. 1551
  12. 1552

    An implementation of the“active-active”data center by Hao FAN

    Published 2016-01-01
    “…With the transition of the traditional data center to cloud data center,government and financial industry's information system disaster recovery and backup becomes an important means to ensure services continuity and data availability.Active-active data center can enhance system availability and improve the utilization of equipment,becoming the future trend of data center construction.Active-active data center involves networking,virtualization,storage technology.These related technologies to achieve active-active in the data center were described,and the effectiveness of the technology was verified by the implementation of the governmental data center.…”
    Get full text
    Article
  13. 1553

    Vers une cartographie géo-lexicale by William Martinez

    Published 2011-06-01
    “…Based on this original visualizing of word structures we will consider the convergence of lexical and cartographic data in a GIS-type database (Geographic Information System).…”
    Get full text
    Article
  14. 1554
  15. 1555
  16. 1556

    À la recherche des points-clefs de Gilbert Simondon autour d’un système d’information géographique by Stephan Kowal

    Published 2018-12-01
    “…The main topic of this article is the development of the Canada Geographic Information System (CGIS) initiated in 1962, an integrated computer system capable of combining national statistical information and cartographic documents, specifically intended for decision-making in regional planning. …”
    Get full text
    Article
  17. 1557
  18. 1558
  19. 1559

    Spatial Analysis and Fuzzy Relation Equations by Ferdinando Di Martino, Salvatore Sessa

    Published 2011-01-01
    “…We integrate this algorithm in a Geographical Information System (GIS) tool, and the geographical area under study is divided in homogeneous subzones (with respect to the parameters involved) to which we apply our process to determine the symptoms after that an expert sets the SFRE with the values of the impact coefficients. …”
    Get full text
    Article
  20. 1560

    Design and Implementation of J2EE Application Service Middleware Monitoring System of Nanning Power Supply Bureau by Yiming Wu, Yongtao Tian

    Published 2013-11-01
    “…J2EE architecture has been widely used in power information system, monitoring J2EE application service middleware is an important task in information operation and maintenance. …”
    Get full text
    Article